Back to Search Start Over

A Process of Penetration Testing Using Various Tools.

Authors :
Kongara, Deepika
Krishnama, Shivani
Source :
Mesopotamian Journal of CyberSecurity; 2023, Vol. 2023, p93-103, 11p
Publication Year :
2023

Abstract

In the present world, information and data are the greatest assets one can possess. If one cannot secure their information from cyber-attacks, they would lose everything in the blink of an eye. Penetration testing can help reduce this cyber-risk exposure of clients' data and protect them. Penetration testing (also called "pen testing") is a part of ethical hacking that exposes the weak areas, vulnerabilities, or loopholes in the core of a PC, its networks, and its applications with the purpose of securing the system. The main idea of pen testing is to find vulnerabilities in systems and fix them before attackers can take advantage of them. These vulnerabilities are identified, exploited, and analyzed in five phases: information gathering, scanning, gaining access, maintaining access, and covering tracks. Penetration testing is done regularly in order to maintain high-security standards. As it pertains to any organization's secrecy and privacy, this testing is also constrained by a number of legal agreements. The work provided by many researchers in the field of penetration (PEN) testing is reviewed and analyzed in this paper. This report gives a detailed description of the process and tools used to conduct penetration testing. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
29586542
Volume :
2023
Database :
Complementary Index
Journal :
Mesopotamian Journal of CyberSecurity
Publication Type :
Academic Journal
Accession number :
176623425
Full Text :
https://doi.org/10.58496/MJCS/2023/014